- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Lecture Cryptography and network security: Chapter 3
Lecture Cryptography and network security: Chapter 3 after studying this section will help you understand: To define the terms and the concepts of symmetric key ciphers; To emphasize the two categories of traditional ciphers: substitution and transposition ciphers; To describe the categories of cryptanalysis used to break the symmetric ciphers;
67 p actvn 26/03/2024 2 0
Từ khóa: Lecture Cryptography and network security, Cryptography and network security, Traditional Symmetric-Key Ciphers, Kerckhoff’s Principle, Polyalphabetic Ciphers, Monoalphabetic Ciphers
Lecture Cryptography and network security: Chapter 5
Lecture Cryptography and network security: Chapter 5 after studying this section will help you understand: To distinguish between traditional and modern symmetric-key ciphers; To introduce modern block ciphers and discuss their characteristics; To explain why modern block ciphers need to be designed as substitution ciphers.
67 p actvn 26/03/2024 1 0
Từ khóa: Lecture Cryptography and network security, Cryptography and network security, Symmetric-key Ciphers, Modern block cipher, Feistel Ciphers
Lecture Cryptography and network security: Chapter 8
Lecture Cryptography and network security: Chapter 8 after studying this section will help you understand: To show how modern standard ciphers, such as DES or AES, can be used to encipher long messages. To discuss five modes of operation designed to be used with modern block ciphers. To define which mode of operation creates stream ciphers out of the underlying block ciphers.
41 p actvn 26/03/2024 1 0
Từ khóa: Lecture Cryptography and network security, Cryptography and network security, Modern Symmetric-Key Ciphers, Electronic Codebook, Cipher Block Chaining, Cipher Feedback
Lecture Cryptography and network security: Chapter 10
Lecture Cryptography and network security: Chapter 10 after studying this section will help you understand: To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; To introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography;...
59 p actvn 26/03/2024 1 0
Từ khóa: Lecture Cryptography and network security, Cryptography and network security, Symmetric-Key Cryptography, Knapsack Cryptosystem, Trapdoor One-Way Function, Security of the Rabin System
Variant of OTP Cipher with symmetric key solution
The paper proposes a solution to construct symmetric–key cryptographic algorithms based on OTP cipher developed based on the cipher One – Time Pad (OTP). Advantages of the algorithms built according to the proposed new solution is to have secure and efficient implementation as OTP cipher, but the establishment, management - distribution and usage of keys are exactly the same as the Symmetric key cryptosystems in practice (DES, AES,...).
10 p actvn 25/12/2023 24 0
Từ khóa: Symmetric-Key Cryptography, Symmetric-Key Cryptographic Algorithm, Symmetric-Key Cryptosystems, One - Time Pad Algorithm, OTP Cipher, Mật mã khóa đối xứng, Hệ mật khóa đối xứng
Ebook Cryptography and network security: principles and practice (5th edition): Part 1
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security....
511 p actvn 31/08/2017 574 17
Từ khóa: Network security, Ebook Cryptography and network security, Symmetric ciphers, Asymmetric ciphers, Cryptographic data integrity algorithms, Internet security
Lecture Security+ Certification: Chapter 10 - Trung tâm Athena
Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
34 p actvn 24/02/2017 408 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Public key infrastructure, Symmetric cryptography
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16404
10 19452
12 23432
Bộ sưu tập Tài liệu học tiếng Anh
14 82793